0% found this document useful (0 votes)
25 views6 pages

Unlocking Security The World of Ethical Hacking

Uploaded by

ndoyedame074
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views6 pages

Unlocking Security The World of Ethical Hacking

Uploaded by

ndoyedame074
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/377343329

Unlocking Security : The World of Ethical Hacking

Article in International Journal of Scientific Research in Science Engineering and Technology · January 2024
DOI: 10.32628/IJSRSET2310666

CITATIONS READS

0 162

4 authors, including:

Darshanaben Dipakkumar Pandya Abhijeetsinh bharastsinh Jadeja


Shri C. J Patel College of Computer Studies ( BCA), Sankalchand Patel University, … Sankalchand Patel College of Engineering
42 PUBLICATIONS 369 CITATIONS 25 PUBLICATIONS 181 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Darshanaben Dipakkumar Pandya on 06 July 2024.

The user has requested enhancement of the downloaded file.


International Journal of Scientific Research in Science, Engineering and Technology

Print ISSN - 2395-1990 Available Online at : www.ijsrset.com


Online ISSN : 2394-4099 doi : https://doi.org/10.32628/IJSRSET2310666

Unlocking Security : The World of Ethical Hacking


Suthar Bhavik1, Mansi Luhariya1, Dr. Darshanaben Dipakkumar Pandya2, Dr. Abhijeetsinh Jadeja3
Department of Computer Science, Shri C. J Patel College of Computer Studies (BCA), Sankalchand Patel
1

University, Visnagar, Gujarat, India


2 Associate Professor, Department of Computer Science, Shri C. J Patel College of Computer Studies (BCA),
Sankalchand Patel University, Visnagar, Gujarat, India
3 I/C Principal, Department of Computer Science, Shri C. J Patel College of Computer Studies (BCA),
Sankalchand Patel University, Visnagar, Gujarat, India

ARTICLEINFO ABSTRACT

Article History : As nowadays all the information is available online, a large number of
users are accessing it, some of them use this information for gaining
Accepted: 01 Jan 2024
knowledge and some use it to know how to use this information to destroy
Published: 10 Jan 2024
or steal the data of websites or databases without the knowledge of the
owner. The purpose of this paper is to tell what is hacking, who is hackers,
what is ethical hacking, what is the code of conduct of ethical hackers and
Publication Issue :
the need of them. A small introduction of Linux Operating System is given
Volume 11, Issue 1
in this paper. All the techniques are performed on the Linux operating
January-February-2024
system named Kali Linux. After this some basic hacking attacks covered in
the paper are MiTM Attack (Man in The Middle Attack), Phishing Attack,
Page Number :
DoS Attack (Denial of Services Attack). Further what is Wi-Fi, what are
41-45
the techniques used in the Wi-Fi protection and the methods used by the
hackers to hacks Wi-Fi passwords is covered in the paper.

Keywords :- Hackers, Malware, Ethical Hackers, MiTM, DoS, Phishing,


Wi-Fi phishing, Code of conduct

I. INTRODUCTION and receiving of various forms of data, thus increasing


the risk of the data security. Nowadays a large number
As the computer technology advances, it has its darker of companies, organizations, banks, and websites are
side also; HACKERS. In today world the size of the targeted by the various types of hacking attacks by the
internet is growing at a very fast rate, a large amount hackers. Generally, after hearing the term hacker we
of data is moving online, therefore, data security is the all think of the bad guys who are computers experts
major issue. The internet has led to the increase in the with bad intensions, who tries to steal, leak or destroy
digitization of various processes like banking, online someone's confidential or valuable data without their
transaction, and online money transfer, online sending knowledge. They are the persons with very high

Copyright: © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed under the
terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use,
41
distribution, and reproduction in any medium, provided the original work is properly cited
Suthar Bhavik et al Int J Sci Res Sci Eng Technol, January-Febuary-2024, 11 (1) : 41-45

computer skills who tries to break into someone else


security for gaining access to their personal
information, but all the times it is not like that. To
overcome the risk of being hacked by the hackers we
have Ethical Hackers in the industry, who are also
computer experts just like the hackers but with good
intensions or bounded by some set of rule and
regulations by the various organizations. These are the
persons who try to protect the online moving data by
the various attacks of the hackers and keeping it safe Fig 1. Types of Hackers
with the owner. Further, this paper tells you more
about hackers, ethical hackers and Linux operating 1. White Hat Hackers:-
system (kali Linux) and aware you about some attacks These hackers use their skills for ethical purposes.
performed by the hackers on the internet. They work legally, often employed by organizations to
identify and fix security vulnerabilities, test systems
What Is Hacking? for weaknesses, and improve cybersecurity measures.
Hacking is a broad term that refers to the unauthorized 2. Black Hat Hackers:-
access, modification, or manipulation of computer These hackers engage in unauthorized and malicious
systems, networks, or devices. It involves exploring activities. They break into systems for personal gain,
weaknesses in computer systems or networks to gain financial profit, data theft, disruption, or other
access to data, disrupt operations, or carry out other nefarious purposes. Black hat hackers are responsible
activities that were not intended by the system's for most cybercrimes.
owner. 3.Grey Hat Hackers:-
This category of hackers operates between white hat
Hackers:- and black hat hackers. They may access systems
without authorization but not with malicious intent.
Hackers are individuals with advanced knowledge of They might uncover vulnerabilities and disclose them
computer systems and networks. They possess skills in to the system owner, often requesting payment for
programming, networking, and security and can use their services.
this expertise to gain unauthorized access to computer
systems, exploit vulnerabilities, and manipulate or Ethical Hacking Process:-
steal data. According to the way of working or based
on their intensions HACKERS can be classified into
three groups

1. White Hat Hackers


2. Black Hat Hackers
3. Grey Hat Hackers

Fig 2 : Ethical Hacking

International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 11 | Issue 1 42
Suthar Bhavik et al Int J Sci Res Sci Eng Technol, January-Febuary-2024, 11 (1) : 41-45

1. Reconnaissance: it with a flood of traffic or requests. The primary goal


Understand the scope and objectives of the ethical of a DoS attack is to render the targeted system
hacking engagement. Gather information about the inaccessible or unusable by legitimate users.
target system or network using non-intrusive methods
such as publicly available information, network
scanning, or reconnaissance tools.
2. Scanning:

Conduct more detailed examination of the target


system’s infrastructure, including networks, servers,
and applications. Use specialized scanning tools to
identify open ports, services, and potential
vulnerabilities. Fig 3 : Dos Attack

3. Gaining Access: Steps for performing a Dos attack on Kali Linux: -

Attempt to exploit discovered vulnerabilities and Open the terminal in kali Linux and type the
weaknesses to gain access to the system or network. command hping3 –c 100000 –d 120 –S –w 64 –p 21 –
Utilize various methods such as password cracking, flood –rand-source (address of the target website) and
social engineering, or exploiting software press enter. In the above command meaning of
vulnerabilities. different parameters are as follows:- hpin3 is the name
of the application binary. –c 100000 is the number of
4. Maintaining Access: packets to send. –d 120 is the size of each packet that
is to be sent to target machine. –s means sending SYN
Once initial access is achieved, ethical hackers
packets only , –w 64 means the TCP window size , –p
attempt to maintain persistent access to the system to
21 is the destination port (21 being FTP port). You can
simulate the actions of a real attacker. Install
use any port here , –flood means sending packets as fast
backdoors or maintain control over the system to
as possible, without taking care to show incoming
demonstrate potential risks and the extent of a
replies , –rand-source means using Random Source IP
successful intrusion.
Addresses , After entering the previous the DoS attack
is started to see how the attack is working open a new
5. Clearing Tracks:
terminal and type tshark and press enter there you will
It is very important, after gaining access and misusing be able to see how packets are sent to the target. Now
the network, that the attacker cover the tracks to avoid to stop the attack press ctrl+c in the DoS attack
being traced and caught. To do this, the attacker clears terminal window. After that you will be able to see
all kinds of logs and malicious malware related to the how many packets are sent. Some of the tools used by
attack. the ethical hackers:

6. Denial of Services (DoS)

A Denial-of-Service (DoS) attack is a malicious


attempt to disrupt the normal functioning of a targeted
system, network, website, or service by overwhelming

International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 11 | Issue 1 43
Suthar Bhavik et al Int J Sci Res Sci Eng Technol, January-Febuary-2024, 11 (1) : 41-45

Port Scanners Nmap, Superscan, Angry IP III. REFERENCES


Scanner, Nikto,
Unicornscan, Autoscan. [1]. Is Ethical Hacking Ethical “ ?,” Int. J. Eng. Sci.
Packet Sniffers Wireshark, TCPdump, Technol., 2011.
Ethercap, Dsniff, EtherApe. [2]. S.P. Oriyano, “Introduction to Ethical Hacking,”
Vulnerability Metasploit, Sqlmap, in CEHTMv9, 2017.
Exploitation Sqlninja, Social Engineer [3]. B. Sahare, A. Naik, and S. Khandey, “Study of
Toolkit, Netsparker, BeEF, Ethical Hacking,” Int. J. Comput. Sci. Trends
Dradis Technol., 2014.
Vulnerability Nessus, OpenVAS, Nipper, [4]. S. Patil, A. Jan gra, M. Bhale, A. Raina, and P.
Scanners Retina, QualysGuard, Kulkarni, “Ethical hacking: The need for cyber
Nexpose. security,” in IEEE International Conference on
Hacking Operating Backtrack5r3, Kalilinux, SE Power, Control, Signals and Instrumentation
System Linux, Knoppix, Backbox Engineering, ICPCSI 2017, 2018, doi:
linux, Pentoo, Matriux, 10.1109/ICPCSI.2017.8391982.
Krypton, NodeZero, [5]. G. R. Lucas, “Cyber warfare,” in The Ashgate
Blackbuntu. Research Companion to Military Ethics, 2016.
Intrusion Detection Snort, Netcap [6]. P. Engebretson, “Reconnaissance,” in The Basics
Systems of Hacking and Penetration Testing, 2011.
[7]. Ehacking, “Scanning and Enumeration- Second
II. CONCLUSION Step of Ethical Hacking,” ehacking, 2011.
[8]. R. Baloch, Ethical Hacking and Penetration
The whole world is moving towards the enhancement Testing Guide. 2017.
of technology, and more and more digitization of the [9]. Hackers? Norton, “What is the Difference
real world processes, with this the risk of security Between Black, White and Grey Hat ” Emerging
increases. This paper described the working of Threats, 2019.
malicious hackers or crackers on one hand who tries [10]. S. Tulasi Prasad, “Ethical Hacking and Types of
to illegally break into the security and on the other Hackers,” Int. J. Emerg. Technol. Comput. Sci.

hand white hat hackers or ethical hackers, who tries Electron., 2014.
to maintain the security. As in the computer system,
hacking plays a vital role as it deals with both sides of Cite this article as :
being good or bad. Further, this paper tells about the
types, working, and various attacks performed by the Suthar Bhavik, Mansi Luhariya, Dr. Darshanaben
hackers. In conclusion, it must be said that Ethical Dipakkumar Pandya, Dr. Abhijeetsinh Jadeja,

Hacking is a tool which when properly utilized can "Unlocking Security : The World of Ethical Hacking ",
help in better understanding of the computer systems International Journal of Scientific Research in Science,
and improving the security techniques as well. Engineering and Technology (IJSRSET), Online ISSN :
2394-4099, Print ISSN : 2395-1990, Volume 11 Issue 1,
pp. 41-45, January-February 2024. Available at doi :
https://doi.org/10.32628/IJSRSET2310666
Journal URL : https://ijsrset.com/IJSRSET2310666

International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 11 | Issue 1 44
Suthar Bhavik et al Int J Sci Res Sci Eng Technol, January-Febuary-2024, 11 (1) : 41-45

Authors Profile:- DR. DARSHANABEN


DIPAKKUMAR PANDYA,
SUTHAR BHAVIK , ASSOCIATE PROFESSOR,
PURSING BCA-4 FROM DEPARTMENT OF
SHRI C. J. PATEL COLLEGE COMPUTER SCIENCE ,
OF COMPUTER STUDIES SHRI C. J PATEL COLLEGE
(BCA) , SANKALCHAND OF COMPUTER STUDIES
PATEL UNIVERSITY , VISNAGAR, 384315. ( BCA), SANKALCHAND PATEL UNIVERSITY ,
VISNAGAR, 384315..
MANSI LUHARIYA,
PURSING BCA-4 FROM DR. ABHIJEETSINH JADEJA,
SHRI C.J PATEL COLLEGE I/C Principal, DEPARTMENT
OF COMPUTER STUDIES OF COMPUTER SCIENCE,
(BCA), SANKALCHAND SHRI C. J PATEL COLLEGE
PATEL UNIVERSITY, OF COMPUTER STUDIES
VISNAGAR, 384315. ( BCA), SANKALCHAND
PATEL UNIVERSITY , VISNAGAR, 384315.

International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 11 | Issue 1 45

View publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy